The Speaker and Language Recognition Workshop (Odyssey 2022) 2022
DOI: 10.21437/odyssey.2022-8
|View full text |Cite
|
Sign up to set email alerts
|

Investigation on Mixup Strategies for End-to-End Voice Spoof Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…For MFCC extraction, we use Hamming window of 25 ms and hop-length of 10 ms. While the mel filter banks (MFB) feature is frequently used with the neural network based classifiers, several works [37,41,81] have also applied MFCCs as input to the TDNN-based classifiers as used in our work. Note that the existing work with the three used corpora [92,53,52,11] also reported their performances mostly using MFCCs.…”
Section: Data Pre-processing and Feature Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…For MFCC extraction, we use Hamming window of 25 ms and hop-length of 10 ms. While the mel filter banks (MFB) feature is frequently used with the neural network based classifiers, several works [37,41,81] have also applied MFCCs as input to the TDNN-based classifiers as used in our work. Note that the existing work with the three used corpora [92,53,52,11] also reported their performances mostly using MFCCs.…”
Section: Data Pre-processing and Feature Extractionmentioning
confidence: 99%
“…We have utilized the ECAPA-TDNN architecture [16], which outperformed other basic TDNN architectures for speaker verification tasks in [16]. This is also very recently adopted for language recognition tasks [37,85]. The ECAPA-TDNN model modifies the basic x-vector architecture in different ways.…”
Section: Architecture Descriptionmentioning
confidence: 99%